Search results for: modern code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4030

Search results for: modern code

1660 Interrogating Western Political Perspectives of Social Justice in Canadian Social Work

Authors: Samantha Clarke

Abstract:

The term social justice is central to social work; however, the meaning behind this term is not as simple as defining the term itself. This is because the meaning of social justice is relative since its origin and development is based on evolving political perspectives. Political perspectives provide numerous lenses to view social justice in social work; however, the realities of changing society have meant that social justice has assumed different values, definitions, and understandings over time and in different geopolitical and cultural contexts. There are many competing and convincing theories of social justice that are relevant to social work practice. Exploring the term is not an idle preoccupation because the meaning of the term is not as crucial as the meaning of the worldview, as it is the worldview that positions social justice as crucial in the emancipation of people marginalized from oppression. The many political assumptions that underlie the term social justice are explored and connected to the contemporary discussions about social justice in social work. These connections are then interrogated in the Canadian Social Works Code of Ethics, and in micro, mezzo, and macro approaches. To be remiss in interrogating the underlying political assumptions of the worldview of social justice is to entrench oppression and to preserve oppressive structures in contemporary Canadian social work. The concept of social justice is unable to withstand closer scrutiny about its emancipatory qualities in Canadian social work when we interrogate the many political assumptions that frame its understanding. In order to authenticate social justice as an emancipatory central organizing principle, Canadian social workers must engage in deeper discussions about the political implications of social justice in their everyday practices based on diverse worldviews and geopolitical contexts. Social workers are well positioned to develop an understanding of social justice that is emancipatory based on their everyday practices because as social and political actors they are positioned to work for and with individuals and toward the greater good of those who are marginalized from oppression.

Keywords: Canadian social work, political analysis, social justice, social work practice

Procedia PDF Downloads 163
1659 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 389
1658 Commodification of the Chinese Language: Investigating Language Ideology in the Chinese Complementary Schools’ Online Discourse

Authors: Yuying Liu

Abstract:

Despite the increasing popularity of Chinese and the recognition of the growing commodifying ideology of Chinese language in many contexts (Liu and Gao, 2020; Guo, Shin and Shen 2020), the ideological orientations of the Chinese diaspora community towards the Chinese language remain under-researched. This research contributes seeks to bridge this gap by investigating the micro-level language ideologies embedded in the Chinese complementary schools in the Republic of Ireland. Informed by Ruíz’s (1984) metaphorical representations of language, 11 Chinese complementary schools’ websites were analysed as discursive texts that signal the language policy and ideology to prospective learners and parents were analysed. The results of the analysis suggest that a move from a portrayal of Chinese as linked to student heritage identity, to the commodification of linguistic and cultural diversity, is evident. It denotes the growing commodifying ideology among the Chinese complementary schools in the Republic of Ireland. The changing profile of the complementary school, from serving an ethnical community to teaching Chinese as a foreign language for the wider community, indicates the possibility of creating the a positive synergy between the Complementary school and the mainstream education. This study contributes to the wider discussions of language ideology and language planning, with regards to modern language learning and heritage language maintenance.

Keywords: the Chinese language;, Chinese as heritage language, Chinese as foreign language, Chinese community schools

Procedia PDF Downloads 106
1657 Implementing Community Policing in Nigeria: Problems and Prospects

Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule

Abstract:

This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.

Keywords: community, policing, problems, prospects, problem solving

Procedia PDF Downloads 46
1656 Assessment of Records Management in Registry Department of Kebbi State University of Science and Technology, Aliero Nigeria

Authors: Murtala Aminu, Salisu Adamu Aliero, Adamu Muhammed

Abstract:

Records are a vital asset in ensuring that the institution is governed effectively and efficiently, and is accountable to its staff, students and the community that it serves. The major purpose of this study was to assess record management of the registry department of Kebbi state University of science and technology Aliero. To be able to achieve this objective, research questions were formulated and answers obtained, which centered on records creation, record management policy, challenges facing records management. The review of related literature revealed that there is need for records to be properly managed and in doing so there is need for good records management policy that clearly spells out the various programs required for effective records management. Survey research method was used involving questionnaire, and observation. The findings revealed that the registry department of the University still has a long way to go with respect to day-today records management. The study recommended provision for adequate, modern, safe and functional storage facilities, sufficient and regular funding, recruitment of trained personnel, on the job training for existing staff, computerization of all units records, and uninterrupted power supply to all parts of the unit as a means of ensuring proper records management.

Keywords: records, management, records management policy, registry

Procedia PDF Downloads 299
1655 An Approach to Apply Kernel Density Estimation Tool for Crash Prone Location Identification

Authors: Kazi Md. Shifun Newaz, S. Miaji, Shahnewaz Hazanat-E-Rabbi

Abstract:

In this study, the kernel density estimation tool has been used to identify most crash prone locations in a national highway of Bangladesh. Like other developing countries, in Bangladesh road traffic crashes (RTC) have now become a great social alarm and the situation is deteriorating day by day. Today’s black spot identification process is not based on modern technical tools and most of the cases provide wrong output. In this situation, characteristic analysis and black spot identification by spatial analysis would be an effective and low cost approach in ensuring road safety. The methodology of this study incorporates a framework on the basis of spatial-temporal study to identify most RTC occurrence locations. In this study, a very important and economic corridor like Dhaka to Sylhet highway has been chosen to apply the method. This research proposes that KDE method for identification of Hazardous Road Location (HRL) could be used for all other National highways in Bangladesh and also for other developing countries. Some recommendations have been suggested for policy maker to reduce RTC in Dhaka-Sylhet especially in black spots.

Keywords: hazardous road location (HRL), crash, GIS, kernel density

Procedia PDF Downloads 295
1654 Machine Learning Techniques in Bank Credit Analysis

Authors: Fernanda M. Assef, Maria Teresinha A. Steiner

Abstract:

The aim of this paper is to compare and discuss better classifier algorithm options for credit risk assessment by applying different Machine Learning techniques. Using records from a Brazilian financial institution, this study uses a database of 5,432 companies that are clients of the bank, where 2,600 clients are classified as non-defaulters, 1,551 are classified as defaulters and 1,281 are temporarily defaulters, meaning that the clients are overdue on their payments for up 180 days. For each case, a total of 15 attributes was considered for a one-against-all assessment using four different techniques: Artificial Neural Networks Multilayer Perceptron (ANN-MLP), Artificial Neural Networks Radial Basis Functions (ANN-RBF), Logistic Regression (LR) and finally Support Vector Machines (SVM). For each method, different parameters were analyzed in order to obtain different results when the best of each technique was compared. Initially the data were coded in thermometer code (numerical attributes) or dummy coding (for nominal attributes). The methods were then evaluated for each parameter and the best result of each technique was compared in terms of accuracy, false positives, false negatives, true positives and true negatives. This comparison showed that the best method, in terms of accuracy, was ANN-RBF (79.20% for non-defaulter classification, 97.74% for defaulters and 75.37% for the temporarily defaulter classification). However, the best accuracy does not always represent the best technique. For instance, on the classification of temporarily defaulters, this technique, in terms of false positives, was surpassed by SVM, which had the lowest rate (0.07%) of false positive classifications. All these intrinsic details are discussed considering the results found, and an overview of what was presented is shown in the conclusion of this study.

Keywords: artificial neural networks (ANNs), classifier algorithms, credit risk assessment, logistic regression, machine Learning, support vector machines

Procedia PDF Downloads 86
1653 The Influence of Concept-Based Teaching on High School Students’ Research Skills

Authors: Nazym Alykpashova

Abstract:

This article is based on the results of the action research at Nazarbayev Intellectual School in Pavlodar, Kazakhstan. The participants of this research were high school students who study Global Perspectives and Project Work course. Intellectual schools are designed to become an experimental site that develops, monitors, studies, analyzes, approves, implements modern models of educational programs. Subjects in NIS aimed to develop skills that will be useful for students in their life. Students learn how to do projects, research credible information, solve different issues. Many subjects cover complex topics, and most teachers feel that they often have to deliver a lot of information within one hour. Many educators recognize Conceptual Teaching, as well as Conceptual Learning, has a lot of benefits for students in terms of developing their perception of the subject topics. This qualitative paper presents findings of two research questions which explored high school students’ perception of conceptual teaching and its impact on their academic performance. Individual semi-structured interviews and observations were conducted with Global Perspectives teachers and students. The results of this action research assist teachers reflect on their professional practice.

Keywords: concept-based teaching, students’ research skills, teacher’s professional development, kazakhstan

Procedia PDF Downloads 124
1652 A Case Study of Conceptual Framework for Process Performance

Authors: Ljubica Milanović Glavan, Vesna Bosilj Vukšić, Dalia Suša

Abstract:

In order to gain a competitive advantage, many companies are focusing on reorganization of their business processes and implementing process-based management. In this context, assessing process performance is essential because it enables individuals and groups to assess where they stand in comparison to their competitors. In this paper, it is argued that process performance measurement is a necessity for a modern process-oriented company and it should be supported by a holistic process performance measurement system. It seems very unlikely that a universal set of performance indicators can be applied successfully to all business processes. Thus, performance indicators must be process-specific and have to be derived from both the strategic enterprise-wide goals and the process goals. Based on the extensive literature review and interviews conducted in Croatian company a conceptual framework for process performance measurement system was developed. The main objective of such system is to help process managers by providing comprehensive and timely information on the performance of business processes. This information can be used to communicate goals and current performance of a business process directly to the process team, to improve resource allocation and process output regarding quantity and quality, to give early warning signals, to make a diagnosis of the weaknesses of a business process, to decide whether corrective actions are needed and to assess the impact of actions taken.

Keywords: Croatia, key performance indicators, performance measurement, process performance

Procedia PDF Downloads 650
1651 'Get the DNR': Exploring the Impact of an Educational eModule on Internal Medicine Residents' Attitudes and Approaches to Goals of Care Conversations

Authors: Leora Branfield Day, Stephanie Saunders, Leah Steinberg, Shiphra Ginsburg, Christine Soong

Abstract:

Introduction: Discordance between patients expressed and documented preferences at the end of life is common. Although junior trainees frequently lead goals of care (GOC) conversations, lack of training can result in poor communication. Based on a needs assessment, we developed an interactive electronic learning module (eModule) for conducting patient-centred GOC discussions. The purpose of this study was to evaluate the impact of the eModule on residents’ attitudes towards GOC conversations. Methods: First-year internal medicine residents (n=11) from the University of Toronto selected using purposive sampling underwent semi-structured interviews before and after completing a GOC eModule. Interviews were anonymized, transcribed and open-coded using NVivo. Using a constructivist grounded theory approach, we developed a framework to understand the attitudes of residents to GOC conversations before and after viewing the module. Results: Before the module, participants described limited training and negative emotions towards GOC conversations. Many focused on code status and procedure choices (e.g., ventilation) instead of eliciting patient-centered values. Pressure to “get the DNR" led to conflicting feelings and distress. After the module, participants’ approached conversations with a greater focus on patient values and process. They felt more prepared and comfortable, recognizing the complexity of conversations and the importance of patient-centeredness. Conclusions: A novel GOC eModule allowed residents to develop a patient-centered and standardized approach to GOC conversations while improving confidence and preparedness. This resource could be an effective strategy toward attaining a critical communication competency among learners with the potential to enhance accurate GOC documentation.

Keywords: goals of care conversations, communication skills, emodule, medical education

Procedia PDF Downloads 120
1650 Rethinking Flâneur: Strolling Spectators in Harlem in Toni Morrison's Jazz

Authors: Yoonjeogn Kim

Abstract:

The concept of flâneur means a walking observer with subjectivity in the urban city and at the same time, an idiomatic and unnamed existence in public. In the modern city, an individual, flâneur walking on the street, observes the street and collects the memories of the past, during which process the individual comes to understand what the past means. However, the concept tends to be narrowly applied to the white middle-class males, thereby excluding females and other marginalized groups. This paper expands the concept to examine black immigrants and black women, who traditionally fall outside the scope of the flâneur. Placing the black immigrants on the trajectory of literary figure of flâneur by reading Tony Morrison's Jazz, this essay revisits the relationship between street and characters in Jazz. In particular, this essay focuses on characters strolling on the street as well as their surroundings. Based on the traditional characteristics of the flâneur, this essay explicates how the black characters in Jazz are reinvented as the flâneur and moving observers with their autonomy to stroll around the city, while the city, which used to be an observer watching and predicting what happens to the characters, takes a position as a mere onlooker. This paper concludes with illustrating the black characters stroll on the street in Harlem and thereby recreating ordinary people living in Harlem as flâneur.

Keywords: jazz, the arcades project, flâneur, flânerie, street, city

Procedia PDF Downloads 151
1649 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 364
1648 Internet of Things Based Patient Health Monitoring System

Authors: G. Yoga Sairam Teja, K. Harsha Vardhan, A. Vinay Kumar, K. Nithish Kumar, Ch. Shanthi Priyag

Abstract:

The emergence of the Internet of Things (IoT) has facilitated better device control and monitoring in the modern world. The constant monitoring of a patient would be drastically altered by the usage of IoT in healthcare. As we've seen in the case of the COVID-19 pandemic, it's important to keep oneself untouched while continuously checking on the patient's heart rate and temperature. Additionally, patients with paralysis should be closely watched, especially if they are elderly and in need of special care. Our "IoT BASED PATIENT HEALTH MONITORING SYSTEM" project uses IoT to track patient health conditions in an effort to address these issues. In this project, the main board is an 8051 microcontroller that connects a number of sensors, including a heart rate sensor, a temperature sensor (LM-35), and a saline water measuring circuit. These sensors are connected via an ESP832 (WiFi) module, which enables the sending of recorded data directly to the cloud so that the patient's health status can be regularly monitored. An LCD is used to monitor the data in offline mode, and a buzzer will sound if any variation from the regular readings occurs. The data in the cloud may be viewed as a graph, making it simple for a user to spot any unusual conditions.

Keywords: IoT, ESP8266, 8051 microcontrollers, sensors

Procedia PDF Downloads 68
1647 The Untold Story of the Importance of ‘Insignia Imprinted’ for the Heritage Clay Roof Tiles in Malaysia

Authors: M. S. Sulaiman, N. Hassan, M. A. Aziz, M. S. A. Haron, J. H. A. Halim

Abstract:

The classic profile of heritage clay roof tiles gives unique characteristics and timeless style to the almost historical building. It is not only designed to meet basic construction needs, offering great performance and durability but also highlights unnoticed stamp impressions, known as ‘insignia imprinted.’ It seems that the insignia imprinted is not significant to all stakeholders, especially in preserving heritage clay roof tiles in Malaysia. They are not even realized the existence and importance of that element, where it represents the cognitive and social character of that particular era. It creates a sense of belongings for the manufacturers regarding their most elementary features, such as a fortress, crown, fauna and etc. This research aims to identify and analyze the late stamp marks on heritage interlocking clay roof tiles in a government heritage building in Malaysia. The methodology used is literature reviews (desktop study), observation on sites, and interviews. Initial findings from the preliminary observation on-site in Peninsular Malaysia show some evidence that the stamp marks appear on the front and back sides of the tile that indicates the year, manufacturer, code numbers, and logos. Almost more than 30 samples of different types of stamp marks were found and collected. Some of which had been described Guichard & Carvin Cie Marsielle St Andre France, Pierre Sacoman St Henry Marsielle, Tuileries Aixoises Les Milles B.D.R France, The Calicut Tile Co Feroke, And B. Pinto & Co Mangalore dated 1865, 1919 and 1936. In view of this abundance of materials, it will lead to the establishment of a comprehensive database consisting of detailed specifications and material performance for future conservation works and maintenance purposes that will sustain for future references.

Keywords: clay roof tiles, insignia imprinted, interlocking, stamp mark

Procedia PDF Downloads 56
1646 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 402
1645 Political Islam: From Coinage to Hot Debate

Authors: Sajid Iqbal Sheikh

Abstract:

From almost last 100 years 'political islam' has diversity in its usage as terminology in the speculative works of both muslim and non-muslims theorists. 'Political islam' as a term was coined consciously as equal to the 'militant islam' and “Terrorist Islam” vs “Plain Islam” and “Modern Islam” etc. Many paradigm shifts tamed the term into one of the hottest debate of the day. This research paper aims to categorize historical linkage of its coinage, development phases and present status. Based on content analysis, Narrative approach has been utilized for the sake of dexterous conclusion. The paper treasures out that Western dominance on civilizational and political spheres of the holistic world considers 'political islam' a gigantic threat and plans to resist it in theoretic and practical fields simultaneously. Despite minor strategic variances, the ideological followers of Syed Qutab, Mulana Mudoodi and Hasan Al-Bana, are struggling hard for the achievement of their ultimate goal of Political change, specifically in the Muslim World in the prior phase. The paper concludes that Resistance to Islamic resurgence and its Political goals is being observed in most of the Muslim world, especially in the Turkey, Algeria, Egypt, Tsunia and Yeman etc, which is a basic cause of contrary reaction in the Muslim World.

Keywords: electoral process, islamic resurgence, islamic political theory, muslim response, resistance, western hegemony

Procedia PDF Downloads 429
1644 An Examination of Criminology and Cyber Crime in Contemporary Society

Authors: Uche A. Nnawulezi

Abstract:

The evolving global environment has as of late seen formative difficulties bordering on cyber crime and its attendant effects. This paper looks at what constitutes an offense of cyber crime under the tenets of International Law as no nation can lay bona-fide claim in managing cyber crime as a criminal phenomenon. Therefore, there has been a plethora of ideological, conceptual and mental propositions of policies aimed at domesticating cyber crimes – an international crime. These policies were as a result of parochial consideration and social foundations which negate the spirit of internationally accepted procedures. The study also noted that the non-domestication of cyber crime laws by most countries has led to an increase in cyber crimes and its attendant effects have remained unabated. The author has pointed out emerging international rules as a panacea for a sustainable cyber crime-free society. The paper relied on documentary evidence and hence scooped much of the data from secondary sources such as text books, journals, articles and periodicals and more so, opinion papers, emanating from international criminal court. It concludes that the necessary recommendations made in this paper, if fully adopted, shall go a long way in maintaining a cyber crime-free society. Ultimately, the domestic and international law mechanisms capable of dealing with cyber crime offenses should be expanded and be made proactive in order to deal with the demands of modern day challenges.

Keywords: criminology, cyber crime, domestic law, international law

Procedia PDF Downloads 168
1643 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System

Authors: Loreta Axhami

Abstract:

Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.

Keywords: authoritarian pedagogic model, education system, ICT, media literacy

Procedia PDF Downloads 114
1642 A Review on Aviation Emissions and Their Role in Climate Change Scenarios

Authors: J. Niemisto, A. Nissinen, S. Soimakallio

Abstract:

Aviation causes carbon dioxide (CO2) emissions and other climate forcers which increase the contribution of aviation on climate change. Aviation industry and number of air travellers are constantly increasing. Aviation industry has an ambitious goal to strongly cut net CO2 emissions. Modern fleet, alternative jet fuels technologies and route optimisation are important technological tools in the emission reduction. Faster approaches are needed as well. Emission trade systems, voluntary carbon offset compensation schemes and taxation are already in operation. Global scenarios of aviation industry and its greenhouse gas emissions and other climate forcers are discussed in this review study based on literature and other published data. The focus is on the aviation in Nordic countries, but also European and global situation are considered. Different emission reduction technologies and compensation modes are examined. In addition, the role of aviation in a single passenger’s (a Finnish consumer) annual carbon footprint is analysed and a comparison of available emission calculators and carbon offset systems is performed. Long-haul fights have a significant role in a single consumer´s and company´s carbon footprint, but remarkable change in global emission level would need a huge change in attitudes towards flying.

Keywords: aviation, climate change, emissions, environment

Procedia PDF Downloads 188
1641 A Study to Examine the Use of Traditional Agricultural Practices to Fight the Effects of Climate Change

Authors: Rushva Parihar, Anushka Barua

Abstract:

The negative repercussions of a warming planet are already visible, with biodiversity loss, water scarcity, and extreme weather events becoming ever so frequent. The agriculture sector is perhaps the most impacted, and modern agriculture has failed to defend farmers from the effects of climate change. This, coupled with the added pressure of higher demands for food production caused due to population growth, has only compounded the impact. Traditional agricultural practices that are routed in indigenous knowledge have long safeguarded the delicate balance of the ecosystem through sustainable production techniques. This paper uses secondary data to explore these traditional processes (like Beejamrita, Jeevamrita, sheep penning, earthen bunding, and others) from around the world that have been developed over centuries and focuses on how they can be used to tackle contemporary issues arising from climate change (such as nutrient and water loss, soil degradation, increased incidences of pests). Finally, the resulting framework has been applied to the context of Indian agriculture as a means to combat climate change and improve food security, all while encouraging documentation and transfer of local knowledge as a shared resource among farmers.

Keywords: sustainable food systems, traditional agricultural practices, climate smart agriculture, climate change, indigenous knowledge

Procedia PDF Downloads 107
1640 Analysis of Vibratory Signals Based on Local Mean Decomposition (LMD) for Rolling Bearing Fault Diagnosis

Authors: Toufik Bensana, Medkour Mihoub, Slimane Mekhilef

Abstract:

The use of vibration analysis has been established as the most common and reliable method of analysis in the field of condition monitoring and diagnostics of rotating machinery. Rolling bearings cover a broad range of rotary machines and plays a crucial role in the modern manufacturing industry. Unfortunately, the vibration signals collected from a faulty bearing are generally nonstationary, nonlinear and with strong noise interference, so it is essential to obtain the fault features correctly. In this paper, a novel numerical analysis method based on local mean decomposition (LMD) is proposed. LMD decompose the signal into a series of product functions (PFs), each of which is the product of an envelope signal and a purely frequency modulated FM signal. The envelope of a PF is the instantaneous amplitude (IA), and the derivative of the unwrapped phase of a purely flat frequency demodulated (FM) signal is the IF. After that, the fault characteristic frequency of the roller bearing can be extracted by performing spectrum analysis to the instantaneous amplitude of PF component containing dominant fault information. The results show the effectiveness of the proposed technique in fault detection and diagnosis of rolling element bearing.

Keywords: fault diagnosis, rolling element bearing, local mean decomposition, condition monitoring

Procedia PDF Downloads 372
1639 Stability Analysis of DC Microgrid with Varying Supercapacitor Operating Voltages

Authors: Annie B. V., Anu A. G., Harikumar R.

Abstract:

Microgrid (MG) is a self-governing miniature section of the power system. Nowadays the majority of loads and energy storage devices are inherently in DC form. This necessitates a greater scope of research in the various types of energy storage devices in DC microgrids. In a modern power system, DC microgrid is a manageable electric power system usually integrated with renewable energy sources (RESs) and DC loads with the help of power electronic converters. The stability of the DC microgrid mainly depends on the power imbalance. Power imbalance due to the presence of intermittent renewable energy resources (RERs) is supplied by energy storage devices. Battery, supercapacitor, flywheel, etc. are some of the commonly used energy storage devices. Owing to the high energy density provided by the batteries, this type of energy storage system is mainly utilized in all sorts of hybrid energy storage systems. To minimize the stability issues, a Supercapacitor (SC) is usually interfaced with the help of a bidirectional DC/DC converter. SC can exchange power during transient conditions due to its high power density. This paper analyses the stability issues of DC microgrids with hybrid energy storage systems (HESSs) arises from a reduction in SC operating voltage due to self-discharge. The stability of DC microgrid and power management is analyzed with different control strategies.

Keywords: DC microgrid, hybrid energy storage system (HESS), power management, small signal modeling, supercapacitor

Procedia PDF Downloads 227
1638 Analytical Comparison of Conventional Algorithms with Vedic Algorithm for Digital Multiplier

Authors: Akhilesh G. Naik, Dipankar Pal

Abstract:

In today’s scenario, the complexity of digital signal processing (DSP) applications and various microcontroller architectures have been increasing to such an extent that the traditional approaches to multiplier design in most processors are becoming outdated for being comparatively slow. Modern processing applications require suitable pipelined approaches, and therefore, algorithms that are friendlier with pipelined architectures. Traditional algorithms like Wallace Tree, Radix-4 Booth, Radix-8 Booth, Dadda architectures have been proven to be comparatively slow for pipelined architectures. These architectures, therefore, need to be optimized or combined with other architectures amongst them to enhance its performances and to be made suitable for pipelined hardware/architectures. Recently, Vedic algorithm mathematically has proven to be efficient by appearing to be less complex and with fewer steps for its output establishment and have assumed renewed importance. This paper describes and shows how the Vedic algorithm can be better suited for pipelined architectures and also can be combined with traditional architectures and algorithms for enhancing its ability even further. In this paper, we also established that for complex applications on DSP and other microcontroller architectures, using Vedic approach for multiplication proves to be the best available and efficient option.

Keywords: Wallace Tree, Radix-4 Booth, Radix-8 Booth, Dadda, Vedic, Single-Stage Karatsuba (SSK), Looped Karatsuba (LK)

Procedia PDF Downloads 152
1637 Filipino And Malaysian Travel Bloggers: Adverbial Intensifiers Used in Blog Description

Authors: Arvin Ludovice

Abstract:

The modern way of communicating and connecting people has been in its easiest forms nowadays, one of it is blog. Blogs, nowadays, are truly relevant in informing people of different as aspects, interests, and fields through these blogs. The evidentiality and testimony of collective people are easily been accessed. However, the description of blog in the making is persuading people, choice of language is one—adverbial intensifiers. Measuring the language on a scale of its intensity subdue the intensity per se. The present study determines, scrutinizes and analyses the adverbial intensifiers used in Filipino and Malaysian. The corpus consists of 30 top travel blogs written by Filipinos and 30 top travel blogs written by Malaysian for a total of 60 travel blogs. The application AntConc was utilized to tag the necessary intensifiers. A frequency distribution of the scores is used to identify the most common intensifiers used by travel bloggers from the Philippines and Malaysia. The scale or degree of intensifier is taken from Quirk Degree of Intensifiers as the basis for the functions of intensifiers. The result found that Malaysian travel blogs are more expressive with the use of the adverbial intensifiers vis-à-vis Filipino travel bloggers, consequently, ranking of the intensifiers, boosters are most used one in expressing and utilizing the language choice a more. The conclusion states that Malaysian travel bloggers are of using the functionality of the adverbial intensifiers. The distinction on the pedagogical implications are hereunto stated as well to deepen and give its significant and importance in language teaching.

Keywords: adverbial intensifiers, blogs, Filipino and Malaysian blogs, AntConc

Procedia PDF Downloads 170
1636 Dogmatic Instrumant in Financing Micro Project

Authors: Adel Fatima Zohra, Guendouz Abdelkader

Abstract:

The solitary sector seems to appear nowadays as a third sector along the private and public ones, because of their ineptitude to take in charge the social exigency of the society regarding the lack in their local assets and the weakness of their financial institutions. The role of this sector is promoting a set of activities in the field of the charity, without aiming neither the individual profit nor a power practice. With the rise in the need of domestic resources, it is possible to count on the Zakat funding to realize some investment projects in order to develop the local society in many sectors as health, agriculture … etc. In the Islamic financial system, the Zakat is likely one of the most important instruments in financing the local development with the respect of the “Charia” rules: the amount of the Zakat is 2.5% of a wealth equivalent of each 85 gr of gold possessed since one year at least. In Algeria a fund of Zakat, was created since 2003 as an alternative to the public finding of development. This fund is a religious and social institution under the supervision of the ministry of religious affairs. This supervision covers two tasks: the first is traditional witch concern the distribution and the forwarding of the zakat to the poor people, and the second is modern concerning the financing of microcredits in the aim to enhance social and economic development. In this paper, we try to highlight the main role of the Zakat fund and its impact on the both social and economic development in Algeria.

Keywords: dogmatic instrument, solidary sector, zakat fund, micro project

Procedia PDF Downloads 251
1635 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 378
1634 A Predictive Analytics Approach to Project Management: Reducing Project Failures in Web and Software Development Projects

Authors: Tazeen Fatima

Abstract:

Use of project management in web & software development projects is very significant. It has been observed that even with the application of effective project management, projects usually do not complete their lifecycle and fail. To minimize these failures, key performance indicators have been introduced in previous studies to counter project failures. However, there are always gaps and problems in the KPIs identified. Despite of incessant efforts at technical and managerial levels, projects still fail. There is no substantial approach to identify and avoid these failures in the very beginning of the project lifecycle. In this study, we aim to answer these research problems by analyzing the concept of predictive analytics which is a specialized technology and is very easy to use in this era of computation. Project organizations can use data gathering, compute power, and modern tools to render efficient Predictions. The research aims to identify such a predictive analytics approach. The core objective of the study was to reduce failures and introduce effective implementation of project management principles. Existing predictive analytics methodologies, tools and solution providers were also analyzed. Relevant data was gathered from projects and was analyzed via predictive techniques to make predictions well advance in time to render effective project management in web & software development industry.

Keywords: project management, predictive analytics, predictive analytics methodology, project failures

Procedia PDF Downloads 319
1633 Web Quest as the Tool for Business Writing Skills Enhancement at Technical University EFL Classes

Authors: Nadezda Kobzeva

Abstract:

Under the current trend of globalization, economic and technological dynamics information and the means by which it is delivered and renewed becomes out-of-date rapidly. Thus, educational systems as well as higher education are being seriously tested. New strategies’ developing that is supported by Information and Communication Technology is urgently required. The essential educators’ mission is to meet the demands of the future by preparing our young learners with proper knowledge, skills and innovation capabilities necessary to advance our competitiveness globally. In response to the modern society and future demands, the oldest Siberian Tomsk Polytechnic University has wisely proposed several initiatives to promote the integration of Information and Communication Technology (ICT) in education, and increase the competitiveness of graduates by emphasizing inquiry-based learning, higher order thinking and problem solving. This paper gives a brief overview of how Web Quest as ICT device is being used for language teaching and describes its use advantages for teaching English as a Foreign Language (EFL), in particular business writing skills. This study proposes to use Web Quest to promote higher order thinking and ICT integration in the process of engineers training in Tomsk Polytechnic University, Russia.

Keywords: web quest, web quest in pedagogy, resume (CVs) and cover letter writing skills, ICT integration

Procedia PDF Downloads 357
1632 Media Usage, Citizenship Norms, and Political Participation of Transition to Democracy in Indonesia

Authors: Najmuddin Najmuddin

Abstract:

The purpose of this study is to determine whether media usage and change of citizenship norms influence political participation. The focus of this study is to examine citizenship norms in the context of the development of information, and communication technology and how it will impact political participation in the context of Indonesia's transition to democracy. The study use survey method. The main theoretical framework is media and political participation. The results of this study reveal that gender, age and educational background of the respondents did not influence significantly media usage and citizenship norms. The Results also show that educational background is not a factor that distinguishes media usage but it becomes differentiating factor in citizenship norms. The results further show that the media usage has a significant correlation with citizenship norms and citizenship norms has a significant relationship with political participation. In addition, media usage and citizenship norms impact significantly to political participation. The sub-dimensions of citizenship norms (compliance, duty, and engaged citizen) provides a significant contribution to the sub-dimensions of political participation (traditional political participation, modern political participation, civic political participation). Based on the findings it can be concluded that the political euphoria in the era of transition to democracy has changed pattern media usage and citizenship norms of among the young generation.

Keywords: media, citizenship, norms, political, participation, democracy

Procedia PDF Downloads 326
1631 Lewis Turning Point in China: Interviewing Perceptions of Fertility Policies by Unmarried Female Millennials

Authors: Yunqi Wang

Abstract:

Benefiting from the demographic dividend, China has enjoyed export-led economic growth since 1978. While Lewis's model marks the structural transformation from the low-wage 'subsistence' sector to the 'modern sector' as the end of labour surplus, the Chinese government seems eager to extend such benefit by promoting a series of fertility encouragement policies, contrasting to its firm and strict birth control since last century. Based on a Attride-Stirling’s thematic analysis of interviews with unmarried female millennials in China, this paper argues that the young female generation responded to current fertility policies negatively, where the policy ineffectiveness and irresponsiveness have further worsened their marriage and childbirth reluctance. Instead of focusing on changes in wage level, this research contributes a qualitative perspective to the existing theoretical debate on the Lewis turning point, implying an inevitable end of demographic dividend in China. Highlighting the greater focus on female consciousness among the younger generation, it also suggests a policy orientation towards resolving outdated social norms to accommodate the rising female consciousness since millennials will become the childbirth mainstay in forthcoming years.

Keywords: lewis model, fertility policy, demographic dividend, one-child policy

Procedia PDF Downloads 96